Lines Matching refs:heap

429    * Use heap memory to allocate DER encoded public/private key.
471 the buffer, causing a heap buffer overflow.
661 * Fix a remotely exploitable heap buffer overflow in TLS handshake parsing.
756 * Use heap memory to allocate DER encoded RSA private key.
875 * Fix a potential heap buffer overread in TLS 1.3 client-side when
1093 * Fix potential heap buffer overread and overwrite in DTLS if
1320 could thus potentially leak the key through freed heap.
1327 * Fix a potential heap buffer overread in TLS 1.2 server-side when
1455 temporary variable on the heap. Suggested by Sergey Kanatov in #5304.
3774 * Fix a 1-byte heap buffer overflow (read-only) during private key parsing.
3791 * Fix a heap corruption issue in the implementation of the truncated HMAC
3794 6 bytes on the peer's heap, which could potentially lead to crash or remote
3805 * Fix a potential heap buffer overflow in mbedtls_ssl_write(). When the (by
3828 * Fix a potential heap buffer over-read in ALPN extension parsing
4070 * Fixed unlimited overread of heap-based buffer in mbedtls_ssl_read().
4206 * Fixed heap overreads in mbedtls_x509_get_time(). Found by Peng
4391 * Fix potential heap corruption on Windows when
4436 * Added fix for CVE-2015-5291 to prevent heap corruption due to buffer
4455 * Fix possible heap buffer overflow in base64_encoded() when the input
4461 * Fix potential heap buffer overflow in servers that perform client
4761 * The benchmark program also prints heap usage for public-key primitives
4763 * New script ecc-heap.sh helps measuring the impact of ECC parameters on
4764 speed and RAM (heap only for now) usage.
5511 * Fixed potential heap buffer overflow on large hostname setting
5695 * Fixed potential heap corruption in x509_name allocation
5721 * Potential heap buffer overflow on large hostname setting
5782 * Fixed potential heap corruption in x509_name allocation
6145 * Fixed dangerous bug that can cause a heap overflow in